Autoregression Models for Trust Management in Wireless Ad Hoc Networks

Size: px
Start display at page:

Download "Autoregression Models for Trust Management in Wireless Ad Hoc Networks"

Transcription

1 Autoregression Models for Trust Management in Wireless Ad Hoc Networks by Zhi Li Thesis submitted to the Faculty of Graduate and Postgraduate Studies In partial fulfillment of the requirements For Masters of Applied Science degree in Electrical Engineering School of Electrical Engineering & Computer Science Faculty of Engineering University of Ottawa c Zhi Li, Ottawa, Canada, 2011

2 Abstract In this thesis, we propose a novel trust management scheme for improving routing reliability in wireless ad hoc networks. It is grounded on two classic autoregression models, namely Autoregressive (AR) model and Autoregressive with exogenous inputs (ARX) model. According to this scheme, a node periodically measures the packet forwarding ratio of its every neighbor as the trust observation about that neighbor. These measurements constitute a time series of data. The node has such a time series for each neighbor. By applying an autoregression model to these time series, it predicts the neighbors future packet forwarding ratios as their trust estimates, which in turn facilitate it to make intelligent routing decisions. With an AR model being applied, the node only uses its own observations for prediction; with an ARX model, it will also take into account recommendations from other neighbors. We evaluate the performance of the scheme when an AR, ARX or Bayesian model is used. Simulation results indicate that the ARX model is the best choice in terms of accuracy. 1

3 Acknowledgement I would like to show my sincerest gratitude to Prof. Amiya Nayak, my supervisor, for his exceptional guidance and support not only in this thesis but also in my study and research. I am grateful to my co-supervisor Prof. Ivan Stojmenovic for his help in my study. Special thanks to Dr. Xu Li who gave me valuable advices, suggestions and encouragements. Lastly, I offer my regards and blessings to all of those who supported me in any respect during the completion of the thesis. 2

4 Contents Abstract 1 Acknowledgement 2 List of Acronyms 9 1 Introduction Background and Motivation Objectives and Contributions Thesis Organization Literature Review Trust Management Trust Trust Management Systems Credential-Based Trust Management Systems Reputation-Based Trust Management Systems Trust Management Models Game Theory for Modeling Trust Graph Theory for Modeling Trust Bayesian Theory for Modeling Trust Markov Chain for Modeling Trust Fuzzy Logic for Modeling Trust

5 3 Proposed Model for Trust Management Autoregressive (AR) Model Autoregressive with Exogenous Inputs (ARX) Model Measuring Model Accuracy Customizing AR and ARX Models for Trust Management System Assumptions and Notations Assumptions Notations Trust Value and Reputation Value AR Model for Trust Management Basic Model Design Evaluation ARX Model for Trust Management Basic Model Design Recommendation Value from Other Nodes Model Adjustment Simulations and Performance Evaluation Using MATLAB System Identification Toolbox Simulation Setup Simulation Results Effect of Network Density on Message Drop Rate Effect of Malicious Nodes on Drop Rate Effect of Model Parameters and Model Accuracy Comparison under the Best Parameter Setting Model Overhead Conclusions & Future Work 76 4

6 6.1 Conclusions Future Work

7 List of Figures 2.1 Trust value lookup [35] Payoff for source and intermediate nodes [35] Normalized Payoff Matrix of the Packet Forwarding Game State diagram of the trust state of the proposed approach [13] The State transition diagram Recommendation age membership functions Transaction frequency membership functions Drop rate with different order Recommendation selection Network Topology Drop Rate in the Network of 100 Nodes Drop Rate in the Network of 90 Nodes Drop Rate in the Network of 80 Nodes Drop Rate with 5 % Malicious Nodes Drop Rate with 10 % Malicious Nodes Drop Rate with 20 % Malicious Nodes The Prediction Error with Changing AR Model Order The Prediction Error with Changing AR Model Update Period The Prediction Error with Changing ARX Model Order The Prediction Error with Changing ARX Model Update Period

8 5.12 The Prediction Values with ARX Model Order Set to [2, 2, 1] The Prediction Values with ARX Model Order Set to [7, 4, 1] The Prediction Values with ARX Model Order Set to [4, 3, 1] The Prediction Values with ARX Model Update Period Set to 10 Time Slots The Prediction Values with ARX Model Update Period Set to 3 Time Slots Message Drop Rate Comparison Comparison between Observation Trust Values and Model Prediction Values

9 List of Tables 2.1 Trust state table The group of fuzzy sets Inference rules for trust aggregation Description of the fuzzy trust levels Index for Comparison among the Models Property Overhead Comparison in Dense Network ARX model Node List BRSN model Node List Overhead Comparison in Sparse Network

10 List of Acronyms AIC Akaike Information Criterion AR Autoregressive ARX Autoregressive with exogenous inputs BIC Bayesian Information Criterion BRSN Beta Reputation system for Sensor Networks model CA Certificate Authority CLA Central Authentication DARWIN Distributed and Adaptive Reputation mechanism for Wireless ad hoc Networks FPE Final Prediction Error KIC Kullback Information Criterion LS Least-Square MANET Mobile Ad hoc Network MDL Minimum Description Length P2P Peer-to-Peer 9

11 PKI Public Key Infrastructure TM Trust Management TFN Triangular Fuzzy Number YW Yule-Walker 10

12 Chapter 1 Introduction 1.1 Background and Motivation With the wireless devices such as cell phones and laptops are becoming more and more popular, the desire of reliable wireless communication is increasing. Multi-hop, wireless, ad hoc networking has been the focus of many recent research and development efforts for its applications in military, commercial, and educational environments such as wireless LAN connections in the office, networks of appliances at home, and sensor networks. Wireless ad hoc networks can be flexibly and quickly deployed for many applications such as automated battlefield operations, search and rescue, and disaster relief. Unlike wired networks or cellular networks, no physical backbone infrastructure is installed in wireless ad hoc networks. Operating in ad-hoc mode allows the wireless devices within range of each other to discover and communicate in peer-to-peer fashion without involving central access points. A communication session is achieved either through a single-hop radio transmission if the communication parties are close enough, or through relaying by intermediate nodes otherwise. Based on the different applications requirements, the wireless ad hoc network could be further extended to Mobile Ad Hoc Network (MANET) with the ability to rebuild the route links all the time for nodes mobility, Wireless Mesh Network (WMN) with the mesh topology and 11

13 Wireless Sensor Network (WSN) with a large amount of sensors spatially distributed in a physical environment. Wireless ad hoc networks are open, self-organized and autonomous [36]. Routing in such networks, for example, is based on a full trust/cooperation between all the participating hosts. Correct transport of the packets on the network relies on the veracity of the information given by the other nodes. The emission of false routing information by a host could thus create bogus entries in routing tables throughout the network making communication difficult. Furthermore, the delivery of a packet to a destination is based on a hop by hop routing and thus needs total cooperation from the intermediate nodes. A malicious host could, by refusing to cooperate, quite simply block or modify the traffic traversing it. Wireless ad hoc networks cannot avoid malicious and selfish nodes. When these nodes are present, the network is at high risk of being threatened and attacked by them. In order to continue working, the network needs to prevent these malicious and selfish nodes from breaking the network. Trust management [7] aims to help capture node relations and predict node behaviors so as to avoid the future transactions of untrustworthy nodes. Trust is therefore a fundamental issue in wireless ad hoc networks for effective and secure communication. Originally trust is used in the social life to represent a relationship between people. Trust in wireless ad hoc or peer-to-peer networks is derived from the definition in social domains. For various applications in such networks, the trust definitions are focused in different points. According to Eschenauer et al. [15], trust is defined as a set of relations among entities that participate in a protocol. These relations are based on the evidence generated by the previous interactions of entities within a protocol. In general, if the interactions have been faithful to the protocol, then trust will accumulate between these entities. 12

14 1.2 Objectives and Contributions There are a number of trust management systems introduced in the literature to deal with trust issues. They can be simply divided into two main categories: Credential- Based Trust Management Systems and Reputation-Based Systems. In most Credential- Based Trust Management Systems, like PolicyMaker [9], KeyNote [8] and Public Key Infrastructure (PKI) [41], the trust relationships between entities are established by managing and exchanging credentials which should be verified and restricted by a preset policy. An entity will be trusted after its credentials have been verified. Credential- Based Trust Management Systems usually make a binary decision whether to allow the request or not based on whether its requestor is trustworthy or not. Because of this binary approach, Credential-Based Trust Management Systems lack flexibility. On the other hand, the Reputation-Based Trust Management Systems perform better by focusing on the evaluation of trust value. A reputation-based system calculates the reputation value of a node by gathering observations of node behaviors. Many schemes for reputation calculation exist, for example, EigenRep [24], Agent-based Trust and Reputation Management (ARTM) [10], TrustMe [37]. Most of the existing trust management systems are not well suitable for wireless ad hoc networks. The objective of this thesis is to explore viable alternatives for modeling trust. In this thesis, in line with the reputation-based approach, we propose a novel trust management scheme as viable alternative for reliable routing in wireless ad hoc networks, by exploiting two classic autoregression models [11], i.e., Autoregressive (AR) model and Autoregressive with exogenous inputs (ARX) model. We present this scheme in the context of Greedy routing [16] and elaborate how AR and ARX are adopted to manage trust. According to the proposed scheme, a node a periodically measures the packet forwarding ratio of its every neighbor b. The measurements are the trust observations about b; they form a time series of data. Then, node a applies an autoregression model to the time series and predict b s future packet forwarding ratio as the trust es- 13

15 timate (or simply trust value) of b. In routing, a takes b as next hop if b is the one with the high trust value closest to destination among all neighbors. With an AR model being applied, a only uses its own observations to predict b s trust value; with an ARX model, a also takes into account the collective recommendation from neighbors, which is the weighted average of the trust values of b in those neighbors opinion. Through extensive simulation, we evaluate the scheme s performance in comparison with an existing trust management scheme based on Bayesian model [17]. Our simulation results indicate that use of the ARX model leads to the best trust estimation accuracy and the largest improvement on routing reliability. Part of this thesis has been accepted for publication at the IEEE Global Communication Conference (Globecom), Texas, Dec [27]. 1.3 Thesis Organization The thesis is organized as follows. Chapter 2 describes the background and related work. Chapter 3 introduces the basic knowledge, with mathematical perspective, of AR and ARX model. The details of how these two models would work in a trust management system are discussed in Chapter 4. Chapter 5 presents the simulation analysis and results. The conclusion and future work is presented in Chapter 6. 14

16 Chapter 2 Literature Review Trust management (TM) foundations are introduced in this chapter. Specifically, TM approaches for wireless ad hoc networks will be discussed. Then, the models for trust management systems classification will be outlined. 2.1 Trust Management In wireless ad hoc networks, threats occur in many transactions. Nodes need to question if they can relay the messages or services received from other peers and also if they can trust them. Trust management (TM) [7] is a mechanism that assigns each node a trust status, based on long-term observations, in order to help judge the degree of trustworthiness of peers. A TM scheme aids each node monitor and predict the behavior of its neighbors Trust In different fields such as psychology, sociology, law and business, the definition of trust is captured by dissimilar standpoints. According to the Merriam-Webster dictionary [47], trust is defined as assured reliance on the character, ability, strength, or truth of 15

17 someone or something. Originally, trust was used in a social context to represent relationships among people. Then, as networks started to resemble human life, trust was introduced into this field to solve the confidence problems mirroring those that occurred in the social world. Trust in wireless ad hoc networks is derived from the definition pulled from social settings. Various applications in wireless ad hoc networks give rise to different conceptions of trust. In this chapter, we prefer to follow the definition proposed by Eschenauer et al. [15], that is: a set of relations among entities that participate in a protocol. These relations are based on the evidence generated by the previous interactions of entities within a protocol. In general, if the interactions have been faithful to the protocol, then trust will accumulate between these entities [15]. Trust in wireless ad hoc networks exhibits the following features: Non-Transitive If A trusts B and B trusts C, it cannot simply be inferred that A trusts C. Non-Static If A trusted B in the past, it cannot imply that A will always trust B. Non-Mutual If A trusts B, it doesn t mean B also trusts A. The trust relationship between two peers can help determine whether A trusts B or not. It can t describe the degree to which a peer can be trusted. An indicator is needed to show the quality of an entity s service. Trustworthiness, sometimes expressed as a trust value, can be used as an indicator of the probability of a peer s future behavior. The computation of the trust value is important in building reliance within a network. Trust management systems are studied with the goal of establishing a computational model to solve the trust problems in peer-to-peer cooperation. 16

18 2.1.2 Trust Management Systems Trust management was first proposed by Blaze [7] in 1996 as a coherent framework for the study of security policies, security credentials and trust relationships [7]. Security policies refer to the trust assertions provided by local systems. Security credentials are the signed trust certificates for entities of a local system which are evidence of their identities. Trust relationships are the relationships based on these policies and credentials. For example, consider an electronic banking system. At least k employees can approve loans of a large amount of money (security policies). The bank needs to enable officers with evidence to prove they are members included in these k employees (security credentials). Furthermore, the bank makes decisions as to who can issue services (trust relationship) [7]. PolicyMaker [9] and KeyNote [8] are the earliest trust management systems. Basically, they all use credential verification to establish the trust relationships among peers. PolicyMaker [9] was proposed by Blaze and works like a central database which can combine the nodes local policies and credentials with the evaluated trust actions and return a decision on whether or not to allow the assessed action. KeyNote [8] provides a unified language to describe security policies, security credentials and trust relationships. When a principal (i.e., an entity authorized to perform actions) requests an action, the system uses KeyNote to correctly implement the security policies, security credentials and trust relationships, and then KeyNote returns a Policy Compliance Value to the system which shows how to deal with the request. With researchers continuously studying trust management, there is an abundance of such systems introduced to solve reliability issues in wireless ad hoc networks. They can be categorized into two major branches: Credential-Based Trust Management Systems and Reputation-Based Trust Management Systems. 17

19 2.1.3 Credential-Based Trust Management Systems In this type of systems, the trust relationships among entities (established by managing and exchanging credentials) is verified and restricted by a preset policy. An entity will be trusted after its credentials have been verified. Every trusted entity can issue its credential to an unknown entity to become trusted. Credentials, for now, are broadly applied as access rights in peer-to-peer (P2P) environment networks. They are always used for establishing trust relations among the participating entities [44]. The early PolicyMaker and KeyNote TM systems are both credential-based. Public Key Infrastructure (PKI) [41] is another seminal system that has spawned many extensions or modifications. PKI is a set of hardware, software, people, policies and procedures needed to create, manage, distribute, use, store, and revoke digital certificates [40]. In P2P networks, PKI can be utilized as an arrangement combining public keys and an entity s identity together, based on a certificate authority (CA). The CA is a trusted center. In some projects, a trusted third party is used to verify, issue and revoke certificates which can delegate CA and grant rights to end users. The credentials in trust management here are regarded as certificates in a PKI system. Although credential-based TM systems can solve the confidence issues that arise in P2P networks, they still have limitations. For example, they usually make binary decisions on whether to allow the request or not based on whether the requestor is trustworthy or not. Because of this binary modeling, it seems that credential-based TM systems lack flexibility. On the other hand, reputation-based TM systems perform better and focus on evaluating the degree of trust Reputation-Based Trust Management Systems Reputation is being widely used in various subjects such as psychology, sociology and business. In the Merriam-Webster dictionary, reputation is defined as the beliefs or opinions that are generally held about someone or something [47]. Reputation is one 18

20 important mechanism that people employ to build trust relationships in wireless ad hoc networks, since a peer s reputation is based on feedback from other peers who have had direct cooperation with it. This feedback is set to represent how trustworthy a peer performs during cooperations. Given a set of feedbacks, reputation can be computed by means of trust functions and represents a peer s degree of trustworthiness, usually ranging from 0 to 1, where 1 means the peer is trustful and 0 indicates that the peer is trustless. In recent years, reputation-based trust management systems have been amply studied. Any such a system calculates the reputation value of a node via gathering observations of the node s behaviors. It does not need any historical experience or prior reputation to measure trustworthiness. Rather, it can set its initial trust value at the beginning. When peers in the system establish a trust relationship with another peer, a trust value is always assigned to this relationship and often computed through reputation during a period of time, that is, Trust value=φ{reputation, the Time elapsed since the reputation was last modified} [4], where Φ{} is the trust function used to compute the trust values. In order to select the trustful peers, reputation-based systems are sometimes equipped with a threshold to eliminate the malicious and selfish nodes which usually have low trust values, or a set range from 0 to 1 for representing the trust status of a peer. In [34], a reputation-based TM protocol for P2P networks was proposed. It is used to distinguish malicious nodes from benign nodes on the basis of utilization, rate and reliability. The scheme assigns to every peer a trust vector to maintain the outcomes of the past interactions with other peers. After every transaction, the responses are sorted and weighted by the credibility rating of the responder. The credibility rating is similar to the trust vector, with a value set between 0 and 1, where the two endpoints represent the failure or success of past transactions, respectively. If peer A wants to issue a trust query to peer B, then the trust value of a peer is described as k i=1 c it i k, 19

21 where c i is the credibility rating of A, t i is the trust rating of B for A and k is the number of times they have interacted in the past. So after this process concludes, B has to judge whether A is malicious or benign according to the trust value. Reputation-based TM systems can help build trust relationships among peers by computing trust values. However, they still have a few drawbacks due to their inherent nature of relying upon the feedback of other peers whose trust values can not be calculated accurately. They may also be dependent on manual settings and thus lack self-adaptive qualities. To solve this problem, researchers start to combine reputation and credentials when creating trust management systems. In [18], the authors employ three modules to make up the trust system, i.e. reputation module, credential learning module and integration module. The reputation modules exploits the Bayesian approach [23] to calculate a peer s reputation based on the feedback from all other peers that have interacted with it. The credential learning module computes the trust values of the peers who have credentials. Finally, the integration module derives the overall trust value by combining reputation and credential values. In this cooperative way, the trust building process is more accurate and adaptive. 2.2 Trust Management Models In general, a TM system leans upon three schemes during the whole trust building process: the trust collection scheme, the trust computation scheme and the decision making scheme. The trust collection scheme is used to gather information on the peers based on their behaviors, which is the foundational aspect in TM systems. It provides the trust computation scheme with the data source to construct the trust relationship. The trust computation scheme calculates the trust values by means of various mathematical techniques that are applied to the data supplied by the trust collection scheme. Afterwards, the final decision should emerge from the decision 20

22 making scheme, which is designed to evaluate the results from the trust computation scheme and has the responsibility of determining which peers should be trusted or selected. Usually, a threshold mechanism is used to filter untrustworthy peers, but setting a level of trust is an optional efficient way to choose peers. In this section, we will explore the literature to show how these three schemes work in TM systems in presence of dissimilar models Game Theory for Modeling Trust Game theory is a branch of applied mathematics popularized by J. V. Neumann [31]. Game theory is a sort of umbrella or unified field theory for the rational side of social science, where social is interpreted broadly so as to include human as well as non-human players (computers, animals, plants) [5]. It has been extensively used in wired and wireless networks for various types of works, such as power control and trust management. There are two types of games, i.e. cooperative and non-cooperative. In the former, the nodes choices to maximize their payoffs depends on the choices of others in a competition whereas in the latter the nodes make their own choices independently. Generally, a game is a model that can address the interaction issues among the players who take actions (make decisions) based on some strategies, and there are payoffs assigned for each combination of strategies. Game theory comes to play an increasingly important role in modeling wireless ad hoc networks and several models have been introduced to manage trust problems therein. These models are studied using various kinds of game strategies but in this chapter they will be simply discussed from their cooperation perspective, i.e. cooperative models versus non-cooperative models. A cooperative game in [35] aims to build a trust computation model where nodes interact with their neighbors locally. First, it should assign every node a trust level 21

23 value. For example, if node B wants to verify node A to see how trustworthy A is, B should evaluate the packet forwarding rate of node A and then, using Figure 2.1, lookup the trust value of node B in node A. Figure 2.1: Trust value lookup [35] Consider a network where there is a source node A that wants to send a packet to node D by using the intermediate nodes B and C. So the game participants are nodes A, B and C. After node B receives the packet from A, B has two options concerning this packet, i.e. to forward it or to discard it. If B chooses the latter, the game ends and every participant node will receive payoffs according to their decisions made during the game. There are two types of payoffs: one assigned to the source nodes and the other to the intermediate nodes. For source node payoffs, if the packet reaches the destination node, then the payoff will be set to S which represents success, otherwise it will be set to F if the transmission has failed. Payoffs for intermediate nodes are contingent upon the nodes decisions and the trust values the source nodes have for them. Generally, the intermediate nodes with higher trust values will always receive high payoffs when they forward the packets. Nodes with higher trust levels are more likely to transfer the packet than nodes with low trust levels concerning their future behavior. If a node discards the packet, then it can be rewarded for saving its battery but its reputation will suffer. So an untrustful node will receive a better payoff when it discards a packet coming from a poorly trusted node and the game may not profit in 22

24 building trust among game participants. An example is shown in Figure 2.2. A wants to send packets to D using intermediate nodes B and C. The result for this game is failure because C discards the packet (Figure 2.2b). After the game, the payoff assigned to intermediate node B is T L3 because it sent the packet and C received an appropriate payoff T L1 due to its dropping the packet, as shown in Figure 2.2. Then the final payoff for source node A is F because the transmission has failed. Figure 2.2: Payoff for source and intermediate nodes [35] A non-cooperative game was developed in [22] between two players. It is known as The Prisoners Dilemma and posed in the network without full cooperation. The nodes in this network are assumed to be selfish but not malicious, that is, they want to maximize their own profit at the minimum cost of their actions. To model the twoplayer game in this paper, it iteratively repeats the game that assumes that nodes send packets to each other and then decide on whether to forward or drop them. There is a reward for each node that chooses to forward the packets and it is set to α, where α 1. The payoff matrix (in its normalized version) is depicted in Figure 2.3. Given the probability of a node forwarding a packet, the average payoff at a time slot can be computed. With this game, the present paper used a reputation strategy named DARWIN to establish a full cooperation between the selfish nodes. It assumes that a player is always in good standing on the first stage and remains like that if her dropping probability is less than the predefined DARWIN dropping probability. Otherwise, it 23

25 turns to a bad standing. If a bad standing player s opponent is in good standing, this bad standing player still could cooperate, otherwise it will defect. DARWIN proposes a measurement of the standing statuses and assumes that players in this network could share the measurements so that the misbehaved and selfish players cannot lie about their standing statuses. This way, the selfish players have limited impact on establishing the cooperative network. Figure 2.3: Normalized Payoff Matrix of the Packet Forwarding Game Graph Theory for Modeling Trust Graph theory studies mathematical structures that are a collection of vertices and edges connecting pairs of these vertices [46]. When building trust in wireless ad hoc networks, graph theory is applied to analyze the local interactions among peers. The study of trust problems in [39] describes a directed graph problem. The peers in the network do not have enough information about each other. In this graph, the vertices represent the peers and the edges stand for their trust relations. The edges are 24

26 weighted by the opinions from a peer about another peer. Each opinion consists of two items: the trust value and the confidence value. The former is the issuer s estimation of the target peer s trustworthiness whereas the latter denotes how accurate the former is. If a peer has conveyed most of the messages the issuer has sent or it has not acted maliciously during its interactions with the issuer, then the confidence value on the issuer s opinion is high. A higher confidence value makes the opinion more useful. Both the trust value and confidence value are assigned by the issuer to the target peer based on local observations using the issuer s own criteria. There are two versions of the trust inference problem. confidence value and trust value from peer A on node B. The first is to find the It can be viewed as the generalized shortest path problem, i.e. the problem can be described as finding the general distance between A and B. The second version is finding the most trusted path between A and B, which is the path with the highest aggregate trust value among all the trust paths from A to B Bayesian Theory for Modeling Trust A Bayesian model [46] is a probabilistic model that relies on a Beta probability density function Beta(α, β) represented as: f(p α, β) = Γ(α + β) Γ(α)Γ(β) pα 1 (1 p) β 1 (2.1) where p is the probability of the event occurrences and should be in the range [0,1], and β > 0, α > 0. A Bayesian model can be applied to analyze trust management systems for wireless ad hoc networks. Usually, when using a Bayesian model to analyze reputation information, one employs two kinds of information: first-hand information and second-hand information. The former is in general obtained by direct observation of any two entities after they have cooperated with each other. Second-hand informa- 25

27 tion can be defined as the opinions of the other entities about the said participating entities. If we assume that in a reputation-based TM system there are r successful transactions and s failed transactions, then in a Bayesian model α in (2.1) will equal to r + 1 where β = s + 1. Authors in [29] discussed the Bayesian model built on secondhand information. For each node, there are other nodes that can carry its reputation. For example, R ij is the reputation of node j carried by a neighboring node i. α ij is the number of successful transactions between node i and node j while β ij is the number of failed transactions between them. Then, the reputation of node j carried by node i is R ij = Beta(α + 1, β + 1). For a more precise evaluation, second-hand information is added to this model. The second-hand information provided by node k to node i about node j is denoted as R kj with two parameters α kj andβ kj. By amalgamating these new pieces of information, a new reputation for node j is defined as R new ij = Beta(α new, β new ). The expected value of reputation T ij can be derived as T ij = E(Rij new ). The expected value T ij could help distinguish misbehaving nodes from normal nodes. In [43], a modified Bayesian scheme for a reputation-based TM system is put forth. It rates reputation and trust based on first-hand reputation information. In this model, the reputation rating from node i to node j is expressed as R i,j according to its firsthand observations based on past cooperation experiences. The trust rating T i,j is node i s opinion about node j on how honest j performs in the system. The first-hand information F i,j is the summary opinion that i has about j. In the reputation rating of this model, node i uses θ to represent the probability of node j s misbehavior, which is updated when first-hand information changes. F ij has a Beta parametric form (α n, β n ) with initial value (α 0,β 0 ) set to (1,1). A weight u is introduced in this reputation rating formula as a fading mechanism because past experience should have less influence on the new reputation. So, the values of α n and β n after n first-hand observations are: 26

28 α n = s n + us n 1 + u 2 s n u n 1 s 1 + u n (2.2) β n = u n + u n u n 1 s 1 u n 2 s 2... us n 1 s n (2.3) where s 1, s 2,...,s n is the sequence of observations. When s i = 1 the observation is regarded as misbehavior, otherwise s i = 0. The reputation value R ij will be updated in the same way that first-hand information F ij is. In trust rating, φ is computed using a similar Bayesian approach to that in F ij in order to derive the probability of node k giving false reports to node i. T ij is updated as long as there is first-hand information F ij for node i from node k about node j. After updating the reputation value and trust value, the model utilizes two thresholds, t r and t u, to help node i classify the behavior and trustworthiness of node j. When node j s θ t r, node j is tagged as misbehaving, otherwise it is normal. If its φ t u, it is regarded to be untrustworthy, otherwise it is trusted by node i. Central to this model is the thresholding method employed in the decision making scheme BRSN Model In order to analyze the performance of the autoregression model family, we need another class of models to compare them to. Bayesian models are good choices because they have been studied for a long time and can help the trust system efficiently build a reliance relationship. In this section, we briefly introduce the Bayesian system and discuss the Beta Reputation system for Sensor Networks model (BRSN) [17] in detail. BRSN is the work of Ganeriwal and Srivastava. It gives a reputation rating based on both first-hand information and second-hand information, which helps avoid a subjective rating. It also provides an aging parameter that gives less weight to historical information. 27

29 In BRSN, a node n i holds a reputation value for its neighbor node n j, which can be represented by a Beta model as R ij = Beta(α ij + 1, β ij + 1). α ij and β ij are the parameters node n i has about node n j. They are all non-negative real numbers. The prediction of trust is the expectation value of the reputation, expressed as follows: T ij = E(R ij ) = α + 1 α + β + 2 (2.4) For updating the reputation, BRSN runs r + s more events, where r represents the number of cooperative transactions, and s represents the number of non-cooperative transactions. Then α and β can be calculated by r and s respectively as shown below: α = r + 1; β = s + 1 (2.5) When a transaction is cooperative, then r will be augmented by 1, otherwise s will increase by 1. The information of r and s is provided by a watchdog block in the system. This block is used for collecting observations and making decisions. The update of the Bayesian system is straightforward because it only requires updates for r and s after each transaction. Recent information should be given more importance and historical information should be attenuated by lowering its weight. This is achieved in the following way: α new ij = (ω age α ij ) + r; β new ij = (ω age β ij ) + s; (2.6) where ω age is the aging weight (randomly ranged between 0 and 1). The weight selection is important in modeling reputation information. First-hand information alone is not sufficient. Here, BRSN included second-hand information provided by node n i s neighbor, n k, about node n j, which is R kj. Node n k has parameters (α kj,β kj ) about node n j. The combination can be derived as: 28

30 αij new 2 α ik α kj = α ij + (2.7) (β ik + 2) (α kj + β kj + 2) + 2 α ik βij new 2 α ik α kj = β ij + (2.8) (β ik + 2) (α kj + β kj + 2) + 2 α ik where α ik and β ik are the parameters that node n i has about node n k. Here, n k s second-hand information is weighted by its reputation. In this case, a more precise prediction can be accomplished. With the second-hand information, the new reputation can be turned to: R new ij = Beta(αij new, βij new ) (2.9) Markov Chain for Modeling Trust The Markov chain is a random process whose future status is determined by its current status [46]. So, it can be used in trust management systems to predict the trust value. Figure 2.4: State diagram of the trust state of the proposed approach [13] A trust derivation approach based on Markov chain for the Multicast MANET is put forward in [13]. There are two main phases in this model. One is used to determine the trust value using Markov chain analysis and the other is central authentication (CLA) selection based on the trust value obtained in the first phase, which can be envisioned as a threefold process. Initially, trust relations among peers are created. Each node in the network evaluates the trust value of its one-hop neighbors. Then, the node with 29

31 Table 2.1: Trust state table Good Manners Trust Value Bad manners Trust value Normal leaving +1 Abnormal leaving -1 Normal joining +1 Abnormal joining -1 Available power is greater than a higher bound Available bandwidth is greater than a higher bound Win the BCA competition and it is not the current CLA or BCA Win the CLA competition and it is not the current CLA Available power is less than a lower bound Available bandwidth is lower than a lower bound Lose the BCA competition and it is the current CLA or BCA Lose the CLA competition and it is the current CLA highest trust value is selected as CLA and that with the second highest trust value as the backup CLA (BCA). The second step is to introduce events for the transitions among trust states in the Markov chain. A peer s trust value will change if the trust state changes. The trust state is assumed in this paper for analyzing the steady state of each peer s trust value. The trust state is shown in Table 2.1, where the trust value with good manners can increase but the ones with bad manners will decrease. For example, a node is inferred to be malicious by sending many JOIN messages in a short time, thus attempting to intrude in the network. An abnormal joining like this should be regarded as malicious activity. Figure 2.4 displays the trust state using the Markov chain model, in which the λ i,i+1 and λ i,i+2 are the arrival rates at state i, and µ i,i 1 and µ i,i 2 are the departure rates at state i. State 0 represents the lowest trust state and state I is the highest trust state. If a peer acts in a good manner listed in the Figure 2.1, then the state will transition from low-trust state to high-trust state, otherwise it will move from high-trust state to low-trust state. The final step is to determine the trust value by calculating the steady trust state probability of each peer using the 30

32 Markov chain. Then with the final trust value, which is related to its historical trust states, the network can efficiently filter the malicious peers to avoid the intrusion and pick a CLA to solve the authentication problems in distributed MANETs. The confidence problem in trust management systems is complicated and usually requires one or more approaches working together. Though trust management systems with Markov chain model are good at predicting the trust states of peers, they still need an efficient approach to evaluate trust values to help with these predictions. Authors in [28] proposed a system putting the Bayesian approach and the Markov chain approach together to prevent good peers from transacting and cooperating with the malicious peers in wireless ad hoc networks. Figure 2.5: The State transition diagram The Bayesian approach aims at calculating the trust value in a more precise way. It collects the historical reputation feedbacks in the system and extracts the Bayesian coefficients using a certain extraction rule. Then, it uses the reputation feedbacks and Bayesian coefficients as inputs to the reputation algorithm that computes the trust values. The Markov chain approach analyzes how the future trust state is influenced by the current trust state. In Figure 2.5, p represents the probability of a peer behaving in a trustworthy fashion in the next state. This indicator differs across various P2P pairs. For example, the p(a, b) between peers a and b is different from p(b, c) between 31

33 peers b and c because they are dependent on their previous transaction experiences. With the probability of these P2P pairs, one can create a generator matrix that can be adjusted by the Bayesian coefficients to predict the trust value. In order to predict the trust state using Markov chains, one needs to establish an available initial Markov state. In this paper, it is assumed that the peers are trustworthy at the beginning, at which time they are called pre-trusted peers. The next step is to find the trust value of the steady state, which can be computed via a reputation algorithm proposed in this paper and expressed as: T T k = αc T T k 1 + β P T 0 (k 1) (2.10) T T k = P T 0 (2.11) where α is the generator matrix weight, β is the pre-trusted peers weight, C is the transition matrix, P T 0 is the initial generator matrix, and T T k is the trust value we want to predict. When the difference between T T k and T T k 1 is less than a very small number ε, then we believe that Tk+1 T reaches the steady state and T (i) k is considered as the final prediction trust value of peer i. Based on the predicted trust value, nodes can distinguish the malicious peers from the good peers and may finally decide which peer to interact with. Therefore, this model aids the network avoiding intrusion by malicious peers Fuzzy Logic for Modeling Trust Fuzzy logic is derived from fuzzy set theory to deal with approximate rather than accurate multiple trust values [46]. It is implemented in a trust management system by means of a predefined fuzzy set. A fuzzy set is a set in which its elements have their degrees of membership to the underlying concept described through membership functions [46]. In trust management, this mathematical fuzzy set of the trust values 32

34 Table 2.2: The group of fuzzy sets Level Linguistic Variable Signification L1 Complete Completely trust L2 Good More trustworthy than most entities L3 Average Mean trustworthiness L4 Minimal Lowest possible trust L5 Ignorance Can not make trust-related judgement L6 Distrust Completely untrust should be first defined. Afterwards, fuzzy operators are employed to obtain the fuzzy result in order to solve the confidence problem in TM systems. An example was given in [45]. The fuzzy set was defined as A = (x, A(x)) where x belongs to the set of X, which is either the source of the information or the entity which builds the trust relationship, and A(x) represents the membership function of every x. To establish a real trust relationship, there exist different types of uncertainty which are categorized into 6 groups in this paper, as portrayed in Table 2.2. To determine the degree of uncertainty, two kinds of trust need to be calculated. One is the direct trust, represented as a D b[l], where entity a is willing to rely on entity b to a degree D under uncertainty L. The other one is the recommendation trust, defined as a D R b[l], which infers that entity a is willing to rely on entity b to a degree D with the recommendation R under uncertainty L. The calculation of the degrees for capturing different types of uncertainty follows after deduction and consensus rules. The deduction rules work in a transitive manner, i.e. they transfer trust from entity to entity in order to create a recommendation path. For example, if entity i wants the recommendation of j through k 1, then the recommendation path will be j k 1 i. If there exists two or more recommendation paths, then the consensus rules are used to merge the multiple recommendations into a singleton comprehensive recommendation. In this process, the calculation of the degree D and the uncertainty L can be determined. This model proposed a general sense in modeling trust using fuzzy logic. 33

35 Table 2.3: Inference rules for trust aggregation Rule # Description 1 If (t T zy ((t), c)) is R and T F zy (c) is H, then ω i is VH 2 If (t T zy ((t), c)) is R and T F zy (c) is M, then ω i is H 3 If (t T zy ((t), c)) is R and T F zy (c) is L, then ω i is M 4 If (t T zy ((t), c)) is O and T F zy (c) is H, then ω i is H 5 If (t T zy ((t), c)) is O and T F zy (c) is M, then ω i is M 6 If (t T zy ((t), c)) is O and T F zy (c) is L, then ω i is L 7 If (t T zy ((t), c)) is VO and T F zy (c) is H, then ω i is M 8 If (t T zy ((t), c)) is VO and T F zy (c) is M, then ω i is L 9 If (t T zy ((t), c)) is VO and T F zy (c) is L, then ω i is VL 10 If a given trust level is UNKNOWN,ω i is zero Table 2.4: Description of the fuzzy trust levels Trust Level Description TFN VL very untrustworthy [ 1.25, 0, 1.25] L untrustworthy [0, 1.25, 2.5] M medium trustworthy [1.25, 2.5, 3.75] H trustworthy [2.5, 3.75, 5] VH very trustworthy [3.75, 5, 6.25] U unknown [0, 0, 0] In [6], a fuzzy model to weigh the direct trust and reputation (second-hand information) in a P2P-based system was presented. The linguistic labels are defined to help peers assign the trust level intervals instead of the exact trust values. The linguistic label values range from very untrustworthy to very trustworthy and are represented in Table 2.4, where a TFN (triangular fuzzy number) for each trust level is defined. The TFN specifies the range of every trust level rather than a specific value. The truth of TFN having only two parameters known as center point and width makes the TFN calculation simple. The trust level that peer x holds towards peer y is computed by taking into account the direct trust (which is contingent on the direct interaction experience between x and y) and the reputation that is shaped by interactions with third party trusted peers, for example, peer z. Both direct trust and reputation are weighted 34

36 by ω 0 and ω i respectively. For reputation weighting ω i calculations, fuzzy inference rules are introduced on the basis of the recommendation time stamp t τ zy ((t), c) and transaction frequency T F zy (c) for context c reported in Table 2.3, where for each recommendation t τ zy ((t), c) fuzzified by the membership function in Figure 2.6, there are three fuzzy sets: recent(r), old(o) and very old(vo), and for each T F zy (c) fuzzified, there are also three fuzzy sets: low(l), medium(m) and high(h) defined by the membership functions depicted in Figure 2.7. Figure 2.6: Recommendation age membership functions Figure 2.7: Transaction frequency membership functions The final trust level can be computed with these weights. This model is rooted on fuzzy logic to determine the weights of direct trust and reputation and then to yield the final trust level. It is a flexible model because the weights can be adjusted for different trust systems. 35

37 Chapter 3 Proposed Model for Trust Management For modeling trust management systems, we prefer to use the autoregressive model with exogenous inputs. There are a lot of models related to autoregression and used to analyze time series. Autoregression is always represented by autoregressive models in which the dependent value is the current value and the independent values are the previous values from the time series. We will review some predominant models to generate a macroscopic view about the autoregression. With this background in mind, we can better understand the model being brought forward in this chapter. 3.1 Autoregressive (AR) Model The autoregressive model (AR) [14] is designed for analyzing and forecasting time series such as average daily temperature or earthquake magnitude over the years. AR predicts the output value y(t) based on its p previous values y(t 1),y(t 2),...,y(t p). A p-order autoregressive model, denoted by AR(p), can be expressed as follows: 36

38 p y(t) = c + ϕ i y(t i) + ε(t) (3.1) i=1 where c is a constant, ε(t) is the white noise term with zero mean, y(t) represents the output at time t, ϕ 1,...,ϕ p are the model coefficients and p is the order of the model. The constant term is often omitted by many authors for simplicity. Time series are either stationary or non-stationary. In the autoregressive model formula (Equation 3.1), if ϕ < 1, y(t) it is a stationary time series, otherwise the time series is not stationary [14]. The AR model is used when the series is stationary. In Equation 3.1, the output y at time t can be estimated as long as the parameters ϕ i and the order p of the model are known. The problem with AR model analysis is how to get the proper parameters and order that best represent the model. A number of algorithms have been developed to calculate AR model s parameters. The Least- Square (LS) [38] and Yule-Walker (YW) [38] approaches are the basic methods most commonly used. The vast majority of the remaining algorithms are modifications or improvements of them. The cycle generalized least squares [42] approach, for example, is a modification of LS focused on improving the efficiency in AR model simulation. There is also a modified Yule-Walker equation algorithm [26] geared at estimating noisy AR processes more accurately. LS is employed to select the best parameters when they can minimize the squared residuals. A residual is the difference between the observed values and those synthesized by the model. In the AR inference process, let Θ denote the unknown parameter vector: Θ T = [ϕ 1, ϕ 2,..., ϕ p ] (3.2) By using LS to estimate the parameters, one arrives at the equation described below [38]: 37

39 N ˆΘ = arg min [y(t) Φ T Θ] 2 (3.3) t=2 where N is the number of elements in the series. If the order is determined in advance, then N will be the order p and the data vector Φ is: Φ = [ y(n), y(n 1),..., y(1)] T (3.4) After the calculations, we can obtain the parameters Θ. Another element needed to determine an AR model is the order, i.e. the number of the parameters in the AR model. Since it is a crucial part in AR model processing, many order selection approaches have been proposed due to the fact that the AR model has been exploited in various types of systems modeling particularly in natural and social environments, e.g. wind speed forecasting [20] and electrical brain activity mapping [32]. 3.2 Autoregressive with Exogenous Inputs (ARX) Model The ARX model is an extension of AR with inputs representing external information. An ARX model with p outputs and b inputs can be denoted by ARX(p, q). Its equation is written as follows: y(t) = ε(t) + p ϕ i y(t i) + i=1 b η i d(t i) (3.5) i=1 where ϕ 1, ϕ 2,...,ϕ p are the parameters of outputs y(t 1),...,y(t p), and η 1, η 2,...,η b are parameters of inputs d(t 1),...,d(t 1). 38

40 To determine the order of an ARX model, we can also use the AIC method. To estimate parameters, it often runs LS to find the minimum-error sum of squares. In ARX parameter estimation, the parameter vector and data vector will change to: Θ T = [ϕ 1, ϕ 2,..., ϕ p, η 1, η 2,..., η b ] (3.6) Φ T = [y(t 1), y(t 2),..., y(t p), d(t 1), d(t 2),..., d(t b)] (3.7) Another way to compute the parameters is via the maximum likelihood method analyzed and popularized by R. A. Fisher [3]. The maximum likelihood method intends to maximize the likelihood function. In ARX models, such function will be represented by [25]: L(Φ T Θ T ) = N f(φ T ; Θ T ) (3.8) i=1 where N is the number of the estimated data samples, f( ) is the probability density function of data noise modeling error vector. The optimal parameters are selected by maximizing the value of L. The LS method and maximum likelihood method are equivalent in terms of parameter estimation. ARX can serve to create an automatic stock market forecasting and portfolio selection mechanism [21]. In this study, the financial data are collected automatically every quarter and furnished as input to an ARX prediction model so as to forecast their future trends over the next quarter or half-year period. 39

41 3.3 Measuring Model Accuracy For evaluating the model accuracy we need some criterion, which we will discuss in this section. The first popular approaches were Final Prediction Error (FPE) [1, 2] and Akaike information criterion (AIC) [2]. FPE is the mean square error of the one-step-ahead prediction based on the LSestimated parameters of the AR model [2] and it is defined as: F P E(p) = N + p N p P p (3.9) where P p is the residual squared error for a p-order AR model and N is the number of the estimated data samples. We take the order p when F P E(p) is minimized. In this case, we choose the order that minimizes the model s average error given the AR parameters. AIC stands for an information criterion, which is a measure of the goodness of the model s fit [2]. In general, AIC is represented by: AIC(p) = ln P p + 2p N (3.10) Again, we select the order p when AIC(p) is minimum. In this way, we find the best model order to represent the data samples with the smallest number of parameters. We also make use of the AIC and FPE values to evaluate how well a model works for a certain system. The model with the minimal AIC and FPE value is the best one. That is to say that the best model we select should efficiently represent the system and also have a minimum final prediction error. There are other widespread approaches to derive the model order, including the Bayesian information criterion (BIC) [33], Kullback information criterion (KIC) [12] and the minimum description length (MDL) [19]. 40

42 Chapter 4 Customizing AR and ARX Models for Trust Management System The major objective of our trust management system is to detect as many malicious and selfish nodes as possible by calculating their trust values in order to prevent them from influencing the network. Based on the trust values, the nodes can be simply labeled as trusted or untrusted. The former are considered to be the ones that normally complete the services requested of them such as message delivery, file sharing, etc. The latter are either the malicious ones that attempt to provide abnormal services to attack the network or the selfish nodes that solely focus on saving their own profits by partially providing services or not providing them at all. To accurately discriminate between trusted and untrusted nodes, one needs to calculate the trust values precise enough to portray the nodes trust status. Therefore, an exact calculation of the trust values is important in TM modeling. In this chapter, the ideas on how AR and ARX models work in analyzing TM systems will be explained in detail. 41

43 4.1 Assumptions and Notations Assumptions To cast the proposed models into a trust management framework, there are some assumptions that need to be predefined: The assumption on nodes: We assume that there is a large number of nodes, which are randomly deployed in a wireless ad hoc network. Each node has a unique identity given by its unique location, so that every peer can be properly identified during any pairwise communication and its trust values can be properly evaluated by one other. There are no energy limitations for every peer to complete its message transmissions. The assumption on systems: In this network, the service peers mainly provide is message transmission, and we suppose that every peer can overhear the position of its neighbor s nodes during transmission, forward the message or drop it. In this way, each peer can generate an observed trust value about the neighbors with which it has interacted after the message delivery. We assume that the message transmission path is built through Greedy routing [16]. This protocol aims at finding the neighboring node with the minimum distance to the destination node. The assumption on message dropping by nodes: A node is allowed to drop a message only when its behavior is not trustworthy; in this way, we can focus on the influence of the node s trust degree on the model s performance Notations Consider a wireless ad hoc network that contains nodes N = {1, 2,..., n}. Every node maintains a list containing its one-hop neighbors and a time-varying set of trust values per neighbor. 42

44 T (t) i,j : The observed trust value of node i towards node j based on their communication at time t. NeighborNode(i): The set of one-hop neighbors of node i. It helps node i select the neighbor with shortest distance to the destination node, since we use greedy routing to build a message transmission path. RP (t) i,j : The reputation value of node i towards node j at time t. It is used to predict node j s future trust value. 4.2 Trust Value and Reputation Value We place our proposed models, i.e. AR and ARX, into the realm of reputation-based TM systems so as to analyze the confidence problem in a wireless ad hoc network. A reputation-based system calculates the reputation value of the nodes by gathering observations about their behaviors over a period of time. When a peer wants to establish a trust relationship with neighbors, it always predicts the trust value of its neighbor to evaluate how trustworthily it will behave in future interactions. The trust value is often computed by reputation over a period of time, i.e. Trust value=φ{reputation, the Time elapsed since the reputation was last modified} [4], where Φ{} is the trust function used to calculate the trust values. Here, Φ is the function in AR or ARX model. 4.3 AR Model for Trust Management In AR model, the predicted trust value is only based on direct observation, which is generated by a node towards the neighbor being assessed on the basis of their past communication history. 43

45 4.3.1 Basic Model Design At first, the nodes are unfamiliar with each other and the trust value for each node is 1, which indicates total trust. At the beginning, every node can communicate with one another. There is a source node i that wants to send a message to a destination node j through several intermediate nodes. The source node first finds its forwarding neighbor by looking at the N eighborn ode(i) list and calculating the distance from each neighboring node to the destination node. Then, it chooses the neighbor with the shortest distance to the destination node and proceeds to evaluate its trust value based on its mutual history of cooperations. If the predicted trust value is high enough, which means that this node will perform well with a high probability, then it should be chosen as the next intermediate node to forward the message. Otherwise, the source node should exclude this node and go on to find the next neighbor node that has the minimal distance and proceed to its evaluation. The steps above should be repeated. In this case, we could find a node that has both short distance to the destination node and high trust value to guarantee that the message would be successfully transmitted. Cooperation can take place with the selected node in terms of message forwarding. After their communication, the nodes will evaluate each other on how well they have done their job. If a node has not performed satisfactorily at time t, it will be assigned a low trust value, which will be updated in evaluator nodes lists at time t. In this way, after numerous communications from time to time, nodes will build their trust value lists. With growing knowledge of the other nodes behaviors, one node can establish the reputation value for other peers. It is defined as the average value of the direct observations taken during a period of time and denoted by RP (t) i,j = T is the time slot duration. T (t)i,j T, where If node i wants to communicate with node j, i will use its reputation value for j, which is based on their past cooperations and predict the behavior that j will exhibit in future communication endeavors by calculating the trust value based on 44

46 these reputations. AR calculation in the AR model can be used to predict this behavior in the form of a trust value. Based on the descriptions of AR models in Section 3.1, the AR model for the TM system could be expressed as: na ˆT (t) i,j = E(t) + ϕ i RP (t p) i,j (4.1) p=1 where ϕ i is the coefficient of the model, na is the order, E(t) is white noise disturbance value and ˆT (t) i,j is the predicted trust value of N j from N i. For the introduction in Section 3.3, we could use LS to estimate the coefficients based on the given reputation values. There exists a common misconception about AR order, i.e. that with larger order the prediction of an AR model is more accurate, since a larger order means more past reference data. However, real observations of the AR model order disproves this belief. From Figure 4.1, we can tell that increasing the order from the 9th value onwards causes the drop rate (percentage % of packets dropped) to grow. This is because past reputation values are out of date and thus not suitable for predicting current trust values. The old reputation values can interfere with the accuracy of the prediction. Therefore, AIC is indeed a good mechanism to determine the order of the model. It aims to find the best model with the smallest order Evaluation Although we can get a predicted value by performing the computations above, without evaluating the formula, we do not know when to choose the node to begin the communication. In this section, we will use a thresholding technique to evaluate the trust value. We define a threshold δ that every node should know. When the predicted value ˆT (t) i,j is above δ, we will let node i view the node j as trustable and start a communica- 45

47 Figure 4.1: Drop rate with different order. tion with it. After that, i and j can update their trust value lists with the observation values. If the predicted value is below the threshold, i will abandon j and go on to find another node providing the same service. The threshold directly determines whether a node can be selected as a cooperator. So it is important to define an appropriate threshold value. If it is too small, then a malicious node may be chosen to engage in a cooperation and it can damage the network. If it is too large, then a lot of nodes fall in increasing the chance of being active in the network, but only a few nodes with high trust values will be maintaining it. In our model, we will define the threshold δ as T (t) i,j. Since one T (t) i,j is only valid for a single na time slot, we need to change δ as the slot changes and, consequently, the trust value list of every node must be updated at the end of every time slot. This scheme determines the threshold value better than predefining it, for it can change later on depending on the observation values that fit the dynamic system. It is more flexible than a fixed threshold method and can select the nodes in a more precise way. 46

48 4.4 ARX Model for Trust Management AR models only focus on the direct observations of a node. They are subjective and insufficient. Using the AR model also causes a loss in the supervision function of a trust management system because a node will never know another node s past behaviors until their communication is made personal. If a node is a good one, then the communication will be beneficial. Yet if it is a misbehaving node, this communication may cause potential damage to the system. To prevent this from happening, the ARX model uses an input clause to establish a supervision function upon the system in the form of indirect recommendations provided by peer nodes that also have communication with the node under assessment. Therefore, ARX models calculate the trust values based on both the direct observations and indirect recommendations from other nodes Basic Model Design At the outset, the trust value of every node is 1, which means total trust as in the AR model. However, with the recommendation part, a supervision function is enhanced. For example, if node i did not communicate with node j which was previously malicious, in AR model node i would take node j to cooperate, which could lead to a message drop or a system attack. However using the ARX model, there may exist a couple of neighbors of node i that might have communicated with node j before and so they could give a recommendation to node i saying that j is untrusted by giving a specific low trust value. Based on the description in Section 3.2, the ARX model for TM systems can be expressed as: na nb ˆT (t) i,j = E(t) + ϕ i RP (t p) i,j + µ i R(t p) i,j (4.2) p=1 p=1 where ϕ i and µ i are the coefficients of the model, na is the order of the outputs, nb is the order of the inputs, and R(t p) i,j is the combined recommendation value from 47

49 node i s neighbors for node j at time t p, which will be discussed in Section Also, the recommendation value is time-varying. Every recommendation is offered in correspondence with the reputation value at a given time. Therefore, we can provide a time series of both reputation and recommendation values for trust value prediction. Before estimating the parameters, we should determine the orders (na,nb) of the model. An appropriate order selection is crucial to the ARX model. If the orders or the historical data are low, then our trust value prediction will not be precise because of a lack of references. This, in turn, may cause a node to choose a liar peer. Otherwise, if the number of the orders are too large, it means that the nodes need to get a lot of information through estimation and that may bring about node overload. In our ARX model, we will choose AIC (Akaike information criterion) [2] to help determine the orders Recommendation Value from Other Nodes When node i wants to estimate how well node j will provide a honest service, its own direct experience is sometimes subjective and not enough, so we need objective opinions to make the estimation more precise. Recommendation can help to solve this problem. In the analysis above, each node has a list of observation values for the nodes it has communicated with in the past. When node i wants to assess node j, then the observation value i maintains on j is based on direct observed experience. The other nodes, for example, k1, k2,..., kn are the neighbors of i and have observation values about j based on their cooperations with j. These values are the recommendations from k1, k2,..., kn, denoted as RP (t) k1,j, RP (t) k2,j,..., RP (t) kn,j respectively, as shown in Figure 4.2. However, this scheme still cannot guarantee a precise prediction if it is rooted solely on the recommendation values without any further reference. Not every node s 48

50 Figure 4.2: Recommendation selection recommendations are trustworthy. Some nodes may provide false recommendations for malicious purposes, especially in resource competition systems. For example, in a credit system, resource like messages could help a node gain credits. There exists intense competition for resources among nodes. If a node wants to hold more exclusive resources and does not want other nodes to get them, it is more likely that it will provide false recommendations with the intention of disrupting the communication flow between the resource provider nodes and the nodes under critical assessment. This would help ensure that the latter cannot get resources. In order to prevent these kinds of node influences upon the trust value prediction process, recommendations should be assessed as well. Nodes that lie about recommendations should be assigned low values so that they cannot influence the estimation too much. Furthermore, malicious and selfish nodes with low reputations should not affect the estimation either. Nodes in either situation may not have a high reputation after several cooperations with their neighbors. So we can weight the recommendations by each node s own reputation values. For example, if k1 wants to provide a recommendation RP (t) k1,j to i about j, it should be weighted by i with the reputation value 49

51 RP (t) i,k1 from i towards k1, represented as RP (t) i,k1 RP (t) k1,j. In this case, the misbehaving nodes cannot be active in trust value prediction. Considering this issue, we define the recommendations offered to node i at a certain time t as: R(t) i,j = RP (t) i,k1rp (t) k1,j + RP (t) i,k2 RP (t) k2,j RP (t) i,kn RP (t) kn,j RP (t) i,k1 + RP (t) i,k RP (t) i,kn (4.3) With the reputation values that node i has about nodes k1,..., kn who give the recommendations, we can assign high weights to the trustworthy nodes so as to let them exercise more influence in the calculations and, analogously, grant low weights to the non-trustworthy nodes in order to minimize their effect. R(t) i,j is the final recommendation value we use in the model at time t Model Adjustment The model, namely the parameters, cannot remain constant over time. The parameters can only offer a precise model with reputation values within a particular time frame. When more recent reputation values are updated, the parameters for the last period of time cannot fit the new slot of reputation values. This means that the model cannot accurately describe the system any more. If we continue using the same parameters for prediction, the difference between measured observation values and predicted trust values will turn larger as time passes by. Therefore, we need to calibrate the model after certain time intervals. If the result meets the minimum validation requirement, e.g. a specific data threshold, then the model is considered to work well. Otherwise, the model needs to be adjusted by using the recent updated reputation values and recommendation values. To validate the model, we employ the coefficient of determination or R 2 presented 50

52 in [30]. According to [30], R 2 is used to measure how well a model could predict a future performance based on comparing the predictions it has made with the corresponding tangible outcomes. In a linear regression, R 2 could be simply defined as the square of the differences between predictions and outcomes, represented as Equation 4.4: R 2 = 1 SS err SS tot (4.4) where SS err is the sum of squares of residuals, i.e. the difference between outcomes and predictions and SS tot is the total sum of squares of differences between outcomes and the average of the outcomes. With the corresponding values of our model, we can change the representation of R 2 into: where R 2 = 1 na t=1 ε(t)2 i,j na t=1 (T (t) (4.5) i,j T (t) i,j ) 2 ε(t) i,j = T (t) i,j ˆT (t) i,j (4.6) T (t) i,j is the mean of the measured trust value in na time slot. The R 2 indicator expresses how close the measured value is to the predicted value. 51

53 Chapter 5 Simulations and Performance Evaluation This chapter covers the details of the simulation of the proposed models on M AT LAB/Simulink platform using the M AT LAB System Identification Toolbox and sheds light on their performance evaluation in Section Using MATLAB System Identification Toolbox System Identification Toolbox is used to construct and estimate the mathematical models for dynamic systems with the measured input and output data from the systems. System Identification Toolbox contains model structures of low-order process models, transfer functions, state-space models, linear models with static nonlinearities at the inputs or outputs, and linear and nonlinear autoregressive models. With this toolbox, we can analyze and process the measured data, determine the model s structure and order, then estimate the model s parameters with the measured data and finally validate its accuracy. After importing the input and output information into the system, we could make use of the toolbox functionality to process the data and estimate the model s parameters, e.g. for autoregressive models (ARX, AR). 52

54 When using data processing functions in our ARX model, the order is set to be a vector of three integers. The default order is [na, nb, nk], where na represents the number of historical direct reputations required in our simulations, nb is the number of historical recommendations from other neighbors and nk the number of recommendation samples loaded in the system, after which the recommendations begin to affect the prediction. We set nk to its default value 1 so as to let the recommendations influence the output prediction right from the outset of the simulations. 5.2 Simulation Setup There were 100 nodes randomly deployed into a rectangular area of m 2, as shown in Figure 5.1. The communication radius of every node is 10 m. It is assumed that each node is capable of bidirectional cooperation and has enough energy to fulfill every interaction. Figure 5.1: Network Topology A total of 600 data communication sessions starting at arbitrary times were simulated. Each session occurs between a randomly selected pair of nodes and involves

55 data packet transmissions at a constant rate of one packet per simulated time unit. We randomly select a certain number of nodes (except source and destination) as malicious nodes. They drop every received packet with 70% probability. Normal nodes drop packets with a small probability of 15%, thus simulating an unreliable wireless communication medium. Each (trust observation) time slot is composed of 5 consecutive simulated time units; in other words, each data communication session spans across 20 time slots. The model validation is carried out every 5 time slots and the model update is conducted immediately if the validation result indicates so. 5.3 Simulation Results In this section we evaluate the performance of the ARX, AR and BRSN models by executing them in wireless network simulations along with a Greedy [16] routing scheme. Firstly, the network density is altered in Section to gauge how it affects each model. Secondly, the number of malicious nodes is varied in Section with the goal of corroborating how stable and efficient each model is. Thirdly, in Section 5.3.3, the importance of setting appropriate model parameters is discussed by evaluating the models performance under different orders and update periods. Fourthly, according to the previous discussion, the optimal model settings for the network are derived. Then under these best settings in Section 5.3.4, the performance of the network with or without trust models is observed. This allows to check how trust models help the network reduce the message drop rate (percentage % of packets dropped). Finally, in Section 5.3.5, the overhead of these three trust models in dense and sparse networks respectively is contrasted. By focusing on the message drop rate, the prediction values and the prediction errors, an insightful comparison among the ARX, AR and BRSN models can be carried out. Furthermore, by referring to values reported by AIC and FPE, the best model can be selected. 54

56 5.3.1 Effect of Network Density on Message Drop Rate In this section, we will focus on the message drop rate of the network in order to evaluate the performance of each trust model. As demonstrated in Section 5.2, the message drop rate of each trust model is calculated during 600 data sessions. To modify the network density, the total number of nodes in the fixed area is varied. In this way, the number of neighbors that provide recommendations varies too. This allows shedding light on how the recommendations affect the overall performance of the trust models. Figure 5.2: Drop Rate in the Network of 100 Nodes With a varying number of recommendations, the ARX and BRSN models would exhibit different performances. However, AR s behavior will not change too much because it does not need any recommendations. In order to evaluate the impact of recommendations over the models performance, the number of nodes is set to 100, 90 and 80 with a constant 15% malicious node rate. By doing so, we vary the density from dense to sparse and hence reduce the number of recommendations. The remaining parameters are fixed as follows: the ARX model s order is set to the best fit value [4, 3, 1] and update period equals 5 time slots; the AR model s order is set to the best fit value 55

57 Figure 5.3: Drop Rate in the Network of 90 Nodes 6 and update period to 5 time slots. Figure 5.4: Drop Rate in the Network of 80 Nodes Figure 5.2 to Figure 5.4 display the message drop rate with varying network density. In a dense network, a larger number of recommendations make ARX and BRSN models achieve a lower drop rate than AR. Moreover, ARX reaches the stable state 56

58 faster. For example, ARX maintains a stable drop rate after 250 data sessions when 100 nodes exist in the network. In a sparse network, a lower number of recommendations make ARX and BRSN models attain a similar drop rate to AR. For example, the drop rate of these three models are very close to each other at the early stage when there are only 80 nodes in the network. Notice that AR s drop rate is almost the same in these three figures as expected. Meanwhile, even with a small number of recommendations, ARX is always the best trust model among all under consideration. ARX was also able to help build reliable relationships among nodes more quickly with more recommendations Effect of Malicious Nodes on Drop Rate To validate how reliable and stable the trust models behave, the number of malicious nodes in the network is modified in the range 5% to 20%. The number of nodes is fixed to 100 so that the number of recommendations will remain unchanged. Other parameters are set as follows: the ARX model s order is set to the best fit value [4, 3, 1] and update period to 5 time slots; the AR model s order is set to the best fit value 6 and update period to 5 time slots. Figure 5.5 to Figure 5.7 show the message drop rate in the network with 5%, 10% and 20% of malicious nodes respectively. Comparing these three figures, one can realize that all three trust models managed to control the drop rate at the lowest level when there are only 5% malicious nodes. As this percentage goes up, the drop rate is also growing from Figure 5.5 to Figure 5.7. Moreover, the time for reaching the stable state is getting longer because the trust models will require more time to identify a larger number of malicious nodes. One may also conclude from the three figures that only ARX can still maintain the message drop rate around 5% regardless of how many malicious nodes are there. With more of these nodes in the network, however, the drop rate of BRSN increases from around 10% to 57

59 Figure 5.5: Drop Rate with 5 % Malicious Nodes Figure 5.6: Drop Rate with 10 % Malicious Nodes 58

60 Figure 5.7: Drop Rate with 20 % Malicious Nodes 15% and that of AR also surges from 10% to 20%. Therefore, we could deduce that the ARX model is always able to work steadily even when a larger number of malicious nodes permeates the network Effect of Model Parameters and Model Accuracy In this section, we will talk about the influence of the model parameters on the network performance by evaluating the prediction errors. property by referring to the AIC and FPE data. We will also analyze the model s The prediction error is useful to measure the difference between the predicted trust values and the observation trust values. If we get a small prediction error value, it means that the predicted trust value is close to the observation trust values, then we could tell that the model s prediction is so accurate that the system could identify the malicious nodes to avoid the attack. The model s parameters mainly consist of the model s order and update period, which are not present in the BRSN model. In Sections and , the prediction errors under different parametric settings are contrasted. The best setting that leads to the lowest prediction error is 59

61 sought as well. Our result is also verified by using the best set when comparing the predicted values versus the observation values in Section Then, with the best setting at hand, the model s property in Section is discussed Effect of the AR Model Parameters on Prediction Error The order of the model must be carefully selected. A large order value causes the prediction to mostly rely on the previous reputations, which may lead to a prediction lag. On the other hand, a small order value cannot provide enough information for a precise prediction. Figure 5.8 unveils that the prediction error decreases before AR model s order reaches 6. After this point, the prediction error becomes visible. It attains its lowest value when the AR model s order is 6 while the network performance peaks up. Besides the model s order, the update period is important as well. It determines how often we change the model coefficient to fit the new reputation values. Figure 5.9 discloses the relationship between the prediction error and the model s update period. The curve reaches the lowest point when the update period is 5. Therefore, if we update the model every 5 time slots, we could accomplish the smallest prediction error. If we update it too often (i.e. update period is too small), we calculate the coefficient using only a little piece of information, which may bring forth an inaccurate prediction. Furthermore, updating the model too often costs the system a large amount of computational effort and storage memory. On the contrary, if we set a long update period, the model will quickly turn out-to-date given that it will not fit the newly updated reputation values, thus leading to a decline in prediction accuracy Effect of ARX Model Parameters on Prediction Error The order of the ARX model consists of three parts: [na, nb, nk], where na is the order of the direct reputation, nb is the order of the recommendation and nk is the number 60

62 Figure 5.8: The Prediction Error with Changing AR Model Order Figure 5.9: The Prediction Error with Changing AR Model Update Period 61

63 of recommendations that occur before they actually affect the prediction, which is set to the default value 1. So we vary na and nb from 2 to 10 to behold the change in prediction error. Figure 5.10 reports that when the order is [4, 3, 1], the prediction error is the smallest. This order indicates that the prediction is the most accurate when it relies on the proper number of objective recommendations instead of on the subjective direct reputations. If we increase na, the prediction becomes inaccurate because the information is too subjective. Otherwise, if we increase nb, the prediction is not precise because it leans too much on the recommendations from other nodes, which may not be trustworthy. Figure 5.10: The Prediction Error with Changing ARX Model Order Similar to the ARX model, the best update period for AR is 5 time slots as Figure 5.9 indicates. This result is in perfect alignment with our experimental setting in Section 5.2, in which the model should be validated every 5 time slots. 62

64 Figure 5.11: The Prediction Error with Changing ARX Model Update Period Model Parameters Evaluation on Prediction Values In Sections and , the best parameter setting for the AR and ARX models were identified. So in this Section, these settings will be verified by considering the prediction values. Because the AR model is similar to ARX model in data processing, we only focus on ARX s prediction values. Figure 5.12: The Prediction Values with ARX Model Order Set to [2, 2, 1] 63

65 In Section , it was assumed that the prediction does not have enough information to be accurate if it involves few direct reputations and recommendations, so the prediction error is high. Figure 5.12 portrays the prediction values with the order fixed to [2, 2, 1]. From the figure, one may become aware that the prediction values hardly get close to the measured ones, especially when there is a large change in the latter. This is because there is not enough information for the ARX model to perform a forecast of the next trusted behavior. But with too much information (i.e. very high order values), the prediction is also not accurate because the redundancy information is overwhelming, as Figure 5.13 reveals. In Figure 5.13, the model order is set to [7, 4, 1] yet the outcome is still unsatisfactory. The prediction has a latency when the measured value changes to a large extent, due to the fact that the model could not swiftly respond to the change in the out-to-date information. As discussed in Section , the best order is [4, 3, 1]. From Figure 5.14, it is possible to verify that the prediction value and the measured value are close. When there is a big change in the measured values, the model could manage the prediction under a permissible error. Figure 5.13: The Prediction Values with ARX Model Order Set to [7, 4, 1] 64

66 Figure 5.14: The Prediction Values with ARX Model Order Set to [4, 3, 1] Figure 5.15: The Prediction Values with ARX Model Update Period Set to 10 Time Slots 65

67 Figure 5.16: The Prediction Values with ARX Model Update Period Set to 3 Time Slots As the update period changes, so it does the performance. Figure 5.15 compares the prediction values yielded with the update period equal to 10 time slots. In order to investigate the effect of the update period, the same order which is the best fit [4, 3, 1] is kept. Compared with Figure 5.14 which exhibits the best update period 5 time slots, one could see that the prediction values in Figure 5.15 can not be confined to a stable range as in Figure If the model is updated too often (with the update period set to 3 time slots as shown in Figure 5.16), the prediction value largely fluctuates when the measured value changes and also becomes more dissimilar from the measured value. This is ascribed to the fact that a long update period could render the model outdated so that it may not fit the new updated information. On the other hand, a short update period could render the information acquisition insufficient so that the prediction is easily influenced by the sharp change of measured trust values, as observed in Figure Therefore, by contrasting the prediction values with the measured values, it is possible to verify that the best fit order for the ARX model is [4, 3, 1] and the best update period is 5 time slots. This finding fully agrees with the result in Section

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks 5th ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN) A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Introduction and Statement of the Problem

Introduction and Statement of the Problem Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network

More information

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation Wireless Network Security 18-639: Spring 2011 Arjun Athreya March 3, 2011 Survey: Trust Evaluation A scenario LOBOS Management Co A CMU grad student new to Pittsburgh is looking for housing options in

More information

An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks

An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks M.Phil Term 3 paper Department of Computer Science and Engineering The Chinese University of Hong Kong written by Edith

More information

A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS

A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS Ramya. S 1 and Prof. B. Sakthivel 2 ramyasiva.jothi@gmail.com and everrock17@gmail.com 1PG Student and 2 Professor & Head, Department

More information

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM Rajalakshmi 1, Umamaheswari 2 and A.Vijayaraj 3 1 Department

More information

Featuring Trust and Reputation Management Systems for Constrained Hardware Devices*

Featuring Trust and Reputation Management Systems for Constrained Hardware Devices* Featuring Trust and Reputation Management Systems for Constrained Hardware Devices* Rodrigo Román, M. Carmen Fernández-Gago, Javier López University of Málaga, Spain *(Wireless Sensor Networks) Contents

More information

Using Game Theory To Solve Network Security. A brief survey by Willie Cohen

Using Game Theory To Solve Network Security. A brief survey by Willie Cohen Using Game Theory To Solve Network Security A brief survey by Willie Cohen Network Security Overview By default networks are very insecure There are a number of well known methods for securing a network

More information

An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks

An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks Georgia State University ScholarWorks @ Georgia State University Computer Science Theses Department of Computer Science 12-4-2006 An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks

More information

Trustworthiness Based Authorization on WWW

Trustworthiness Based Authorization on WWW CERIAS Tech Report 2002-08 Trustworthiness Based Authorization on WWW Y. Zong, B. Bhargava, M. Mahoui Center for Education and Research in Information Assurance and Security & Department of Computer Science,

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many

More information

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks

A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks A Hybrid Approach for Misbehavior Detection in Wireless Ad-Hoc Networks S. Balachandran, D. Dasgupta, L. Wang Intelligent Security Systems Research Lab Department of Computer Science The University of

More information

Integrating Dirichlet Reputation into Usage Control

Integrating Dirichlet Reputation into Usage Control Integrating Dirichlet Reputation into Usage Control Li Yang and Alma Cemerlic University of Tennessee at Chattanooga Cyber Security and Information Intelligence Research Workshop 2009 Motivation of the

More information

CLUSTER-BASED CERTIFICATE REVOCATION IN MOBILE AD-HOC NETWORK USING FUZZY LOGIC Dipti S Sawant 1, Prof. E. Jayanthi 2 1,2

CLUSTER-BASED CERTIFICATE REVOCATION IN MOBILE AD-HOC NETWORK USING FUZZY LOGIC Dipti S Sawant 1, Prof. E. Jayanthi 2 1,2 CLUSTER-BASED CERTIFICATE REVOCATION IN MOBILE AD-HOC NETWORK USING FUZZY LOGIC Dipti S Sawant 1, Prof. E. Jayanthi 2 1,2 Department of Computer Engineering, Sinhgad College of Engineering, Pune, India.

More information

All Rights Reserved 2017 IJARCET

All Rights Reserved 2017 IJARCET END-TO-END DELAY WITH MARKOVIAN QUEUING BASED OPTIMUM ROUTE ALLOCATION FOR MANETs S. Sudha, Research Scholar Mrs. V.S.LAVANYA M.Sc(IT)., M.C.A., M.Phil., Assistant Professor, Department of Computer Science,

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

Trust in Ad hoc Networks A Novel Approach based on Clustering

Trust in Ad hoc Networks A Novel Approach based on Clustering Trust in Ad hoc Networks A Novel Approach based on Clustering J. Boodnah and E.M. Scharf Department of Electronic Engineering, Queen Mary, University of London Abstract Ad hoc Networks by virtue of their

More information

Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism Santhosh Krishna B.V, Mrs.Vallikannu A.L

Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism Santhosh Krishna B.V, Mrs.Vallikannu A.L International Journal of Scientific & Engineering Research, Volume 1, Issue 3, December-2010 1 Detecting Malicious Nodes For Secure Routing in MANETS Using Reputation Based Mechanism Santhosh Krishna B.V,

More information

A Generic Framework for Modeling Decentralized Reputation-based Trust Models

A Generic Framework for Modeling Decentralized Reputation-based Trust Models Institute for Software Research University of California, Irvine A Generic Framework for Modeling Decentralized Reputation-based Trust Models Girish Suryanarayana University of California, Irvine sgirish@ics.uci.edu

More information

FUZZY INFERENCE SYSTEMS

FUZZY INFERENCE SYSTEMS CHAPTER-IV FUZZY INFERENCE SYSTEMS Fuzzy inference is the process of formulating the mapping from a given input to an output using fuzzy logic. The mapping then provides a basis from which decisions can

More information

Securing BGP. Geoff Huston November 2007

Securing BGP. Geoff Huston November 2007 Securing BGP Geoff Huston November 2007 Agenda An Introduction to BGP BGP Security Questions Current Work Research Questions An Introduction to BGP Background to Internet Routing The routing architecture

More information

Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage

Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage 1 Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage Lan Zhou,Vijay Varadharajan,and Michael Hitchens Abstract Cloud data storage has provided significant benefits by

More information

Dynamic Thresholding for Image Analysis

Dynamic Thresholding for Image Analysis Dynamic Thresholding for Image Analysis Statistical Consulting Report for Edward Chan Clean Energy Research Center University of British Columbia by Libo Lu Department of Statistics University of British

More information

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Samuel Coolidge, Dan Simon, Dennis Shasha, Technical Report NYU/CIMS/TR

Samuel Coolidge, Dan Simon, Dennis Shasha, Technical Report NYU/CIMS/TR Detecting Missing and Spurious Edges in Large, Dense Networks Using Parallel Computing Samuel Coolidge, sam.r.coolidge@gmail.com Dan Simon, des480@nyu.edu Dennis Shasha, shasha@cims.nyu.edu Technical Report

More information

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET

Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET International Journal of Scientific and Research Publications, Volume 3, Issue 5, May 2013 1 Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET Ms.T.R.Panke * M.B.E.S.College of

More information

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data Volume 117 No. 15 2017, 1087-1094 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Eradication of Vulnerable host from N2N communication Networks using

More information

COOPERATION-AWARE TOPOLOGY CONTROL

COOPERATION-AWARE TOPOLOGY CONTROL COOPERATION-AWARE TOPOLOGY CONTROL Vivek Srivastava Arlington, VA. USA. Ramakant Komali Blacksburg, VA. USA. Allen B. MacKenzie Blacksburg, VA. USA. Luiz A. DaSilva Arlington, VA. USA. ABSTRACT In ad hoc

More information

They avoid the cost, installation, and maintenance of network infrastructure.

They avoid the cost, installation, and maintenance of network infrastructure. Ad Hoc Network Ammar Abu-Hudrouss Islamic University Gaza ١ Introduction An ad hoc wireless network is a collection of wireless mobile nodes that self-configure to form a network without the aid of any

More information

A Composite Trust based Public Key Management in MANETs

A Composite Trust based Public Key Management in MANETs USMA 6 th Network Science Workshop April 23, 2012 West Point, NY U.S. Army Research, Development and Engineering Command A Composite Trust based Public Key Management in MANETs Jin-Hee Cho and Kevin Chan

More information

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically

More information

An incentive based approach to detect selfish nodes in Mobile P2P network

An incentive based approach to detect selfish nodes in Mobile P2P network Scholars' Mine Masters Theses Student Research & Creative Works Spring 2011 An incentive based approach to detect selfish nodes in Mobile P2P network Hemanth Meka Follow this and additional works at: http://scholarsmine.mst.edu/masters_theses

More information

Using VCG based Designing and Electing Secure Leader Model for Intrusion Detection System in Manet

Using VCG based Designing and Electing Secure Leader Model for Intrusion Detection System in Manet International Journal of Wireless Networks and Communications. ISSN 0975-6507 Volume 4, Number 1 (2012), pp. 71-81 International Research Publication House http://www.irphouse.com Using VCG based Designing

More information

Caveat. Much of security-related stuff is mostly beyond my expertise. So coverage of this topic is very limited

Caveat. Much of security-related stuff is mostly beyond my expertise. So coverage of this topic is very limited Security Issues 476 Caveat Much of security-related stuff is mostly beyond my expertise So coverage of this topic is very limited 477 Security Issues in Mobile Ad Hoc Networks Not much work in this area

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

CHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES

CHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES 70 CHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES 3.1 INTRODUCTION In medical science, effective tools are essential to categorize and systematically

More information

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Sapna B Kulkarni,B.E,MTech (PhD) Associate Prof, Dept of CSE RYM Engg.college, Bellari VTU Belgaum Shainaj.B

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

Secure Routing and Transmission Protocols for Ad Hoc Networks

Secure Routing and Transmission Protocols for Ad Hoc Networks MobiHoc 2002 Working Session on Security in Ad Hoc Networks Secure Routing and Transmission Protocols for Ad Hoc Networks Zygmunt J. Haas and P. Papadimitratos (Panos) Cornell University Wireless Networks

More information

Sleep/Wake Aware Local Monitoring (SLAM)

Sleep/Wake Aware Local Monitoring (SLAM) Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and

More information

Multicasting in ad hoc networks: Energy efficient

Multicasting in ad hoc networks: Energy efficient Multicasting in ad hoc networks: Energy efficient Blerta Bishaj Helsinki University of Technology 1. Introduction...2 2. Sources of power consumption... 3 3. Directional antennas... 3 4. TCP... 3 5. Energy-efficient

More information

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS

OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS OPTIMIZING MOBILITY MANAGEMENT IN FUTURE IPv6 MOBILE NETWORKS Sandro Grech Nokia Networks (Networks Systems Research) Supervisor: Prof. Raimo Kantola 1 SANDRO GRECH - OPTIMIZING MOBILITY MANAGEMENT IN

More information

AN ad-hoc network is a group of nodes without requiring

AN ad-hoc network is a group of nodes without requiring 240 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 2, NO. 2, JUNE 2007 Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis Wei

More information

A Survey of Trust Computation Models for Service Management in Internet of Things Systems

A Survey of Trust Computation Models for Service Management in Internet of Things Systems A Survey of Trust Computation Models for Service Management in Internet of Things Systems Abstract Jia Guo, Ing-Ray Chen, and Jeffrey J.P. Tsai* Virginia Tech Department of Computer Science {jiaguo, irchen}@vt.edu

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks X. Zhang, X. Dong Shanghai Jiaotong University J. Wu, X. Li Temple University, University of North Carolina N. Xiong Colorado

More information

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American

More information

13 Sensor networks Gathering in an adversarial environment

13 Sensor networks Gathering in an adversarial environment 13 Sensor networks Wireless sensor systems have a broad range of civil and military applications such as controlling inventory in a warehouse or office complex, monitoring and disseminating traffic conditions,

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Comparison of DSDV, AODV, DSR, Routing protocols

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

INTERNATIONAL JOURNALOF RESEARCH SCIENCE & MANAGEMENT

INTERNATIONAL JOURNALOF RESEARCH SCIENCE & MANAGEMENT AN ENHANCED CROSS LAYER SCHEME FOR BACK OFF ATTACK AND NETWORK LAYER MISBEHAVIOR DETECTION IN MANET R. Kumaran* 1 & K P K Devan 2 Department of Computer Science and Engineering, Easwari engineering college

More information

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Mitigating Malicious Activities by Providing New Acknowledgment Approach Mitigating Malicious Activities by Providing New Acknowledgment Approach G. S. Devi Lakshmi, J. Rajasekaran 2 PG Student, Sri Subramanya College of Engineering and Technology, Palani, Tamilnadu, India

More information

Countering Hidden-Action Attacks on Networked Systems

Countering Hidden-Action Attacks on Networked Systems Countering on Networked Systems University of Cambridge Workshop on the Economics of Information Security, 2005 Outline Motivation 1 Motivation 2 3 4 Motivation Asymmetric information inspires a class

More information

Cooperation in Mobile Ad Hoc Networks

Cooperation in Mobile Ad Hoc Networks Cooperation in Mobile Ad Hoc Networks Jiangyi Hu Computer Science Department Florida State University January 11, 2005 Abstract In this report we consider selfish node behavior in ad hoc networks and discuss

More information

Clustering the Internet Topology at the AS-level

Clustering the Internet Topology at the AS-level Clustering the Internet Topology at the AS-level BILL ANDREOPOULOS 1, AIJUN AN 1, XIAOGANG WANG 2 1 Department of Computer Science and Engineering, York University 2 Department of Mathematics and Statistics,

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #10 Network Layer Threats; Identity Mgmt. 2015 Patrick Tague 1 Class #10 Summary of wireless network layer threats Specific threats related to

More information

IEEE networking projects

IEEE networking projects IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Jan 18, 2011 Class #3 Wireless vulnerabilities and threats Announcement: Agenda 6 remaining survey slots, 12 students yet to sign up Vulnerabilities,

More information

Packet Estimation with CBDS Approach to secure MANET

Packet Estimation with CBDS Approach to secure MANET Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,

More information

Reputation Based Trust Management for Wireless Sensor Networks and Its Application to Secure Routing

Reputation Based Trust Management for Wireless Sensor Networks and Its Application to Secure Routing ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

TAODV: A Trusted AODV Routing Protocol for Mobile Ad Hoc Networks

TAODV: A Trusted AODV Routing Protocol for Mobile Ad Hoc Networks TAODV: A Trusted AODV Routing Protocol for Mobile Ad Hoc Networks Abstract In this paper, we design and formulate a novel trust-based routing protocol for secure transactions, such as military and disaster

More information

A Search Theoretical Approach to P2P Networks: Analysis of Learning

A Search Theoretical Approach to P2P Networks: Analysis of Learning A Search Theoretical Approach to P2P Networks: Analysis of Learning Nazif Cihan Taş Dept. of Computer Science University of Maryland College Park, MD 2742 Email: ctas@cs.umd.edu Bedri Kâmil Onur Taş Dept.

More information

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based

More information

Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 802.1w)

Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 802.1w) Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 0.1w) Michael Galea, Marzio Pozzuoli RuggedCom Inc. - Industrial Strength Networks Woodbridge, Ontario, Canada Introduction Ethernet

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

FACILITY LIFE-CYCLE COST ANALYSIS BASED ON FUZZY SETS THEORY Life-cycle cost analysis

FACILITY LIFE-CYCLE COST ANALYSIS BASED ON FUZZY SETS THEORY Life-cycle cost analysis FACILITY LIFE-CYCLE COST ANALYSIS BASED ON FUZZY SETS THEORY Life-cycle cost analysis J. O. SOBANJO FAMU-FSU College of Engineering, Tallahassee, Florida Durability of Building Materials and Components

More information

Course Curriculum for Master Degree in Network Engineering and Security

Course Curriculum for Master Degree in Network Engineering and Security Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science

More information

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network Global Journal of researches in engineering Electrical and electronics engineering Volume 12 Issue 3 Version 1.0 March 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department

More information

CIP Security Pull Model from the Implementation Standpoint

CIP Security Pull Model from the Implementation Standpoint CIP Security Pull Model from the Implementation Standpoint Jack Visoky Security Architect and Sr. Project Engineer Rockwell Automation Joakim Wiberg Team Manager Technology and Platforms HMS Industrial

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

COMPUTER NETWORKS PERFORMANCE. Gaia Maselli

COMPUTER NETWORKS PERFORMANCE. Gaia Maselli COMPUTER NETWORKS PERFORMANCE Gaia Maselli maselli@di.uniroma1.it Prestazioni dei sistemi di rete 2 Overview of first class Practical Info (schedule, exam, readings) Goal of this course Contents of the

More information

Lecture Notes 14 : Public-Key Infrastructure

Lecture Notes 14 : Public-Key Infrastructure 6.857 Computer and Network Security October 24, 2002 Lecture Notes 14 : Public-Key Infrastructure Lecturer: Ron Rivest Scribe: Armour/Johann-Berkel/Owsley/Quealy [These notes come from Fall 2001. These

More information

Supplementary file for SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks

Supplementary file for SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks 1 Supplementary file for SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks Wei Wei, Fengyuan Xu, Chiu C. Tan, Qun Li The College of William and Mary, Temple University {wwei,

More information

Lecture on Modeling Tools for Clustering & Regression

Lecture on Modeling Tools for Clustering & Regression Lecture on Modeling Tools for Clustering & Regression CS 590.21 Analysis and Modeling of Brain Networks Department of Computer Science University of Crete Data Clustering Overview Organizing data into

More information

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Sangheon Pack and Yanghee Choi School of Computer Science & Engineering Seoul National University Seoul, Korea Abstract Next-generation

More information

CONCLUSIONS AND SCOPE FOR FUTURE WORK

CONCLUSIONS AND SCOPE FOR FUTURE WORK Introduction CONCLUSIONS AND SCOPE FOR FUTURE WORK 7.1 Conclusions... 154 7.2 Scope for Future Work... 157 7 1 Chapter 7 150 Department of Computer Science Conclusion and scope for future work In this

More information

Securing MANETs using Cluster-based Certificate Revocation Method: An Overview

Securing MANETs using Cluster-based Certificate Revocation Method: An Overview Securing MANETs using Cluster-based Certificate Revocation Method: An Overview Mrs. Dipti S. Sawant Dept. of Computer Engineering, Sinhgad College of Engineering, Pune, India. 411 041 Prof. J. E. Kamalasekaran

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Chapter 8: Energy Conservation. MANETs. Prof. Yuh-Shyan Chen Department t of Computer Science and Information Engineering

Chapter 8: Energy Conservation. MANETs. Prof. Yuh-Shyan Chen Department t of Computer Science and Information Engineering Chapter 8: Energy Conservation for Broadcast Routing in MANETs Prof. Yuh-Shyan Chen Department t of Computer Science and Information Engineering National Taipei University 1 Outline Introduction Energy-Efficient

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

Chapter-4. Simulation Design and Implementation

Chapter-4. Simulation Design and Implementation Chapter-4 Simulation Design and Implementation In this chapter, the design parameters of system and the various metrics measured for performance evaluation of the routing protocols are presented. An overview

More information

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Project Report: "Bayesian Spam Filter"

Project Report: Bayesian  Spam Filter Humboldt-Universität zu Berlin Lehrstuhl für Maschinelles Lernen Sommersemester 2016 Maschinelles Lernen 1 Project Report: "Bayesian E-Mail Spam Filter" The Bayesians Sabine Bertram, Carolina Gumuljo,

More information

Reliable Time Synchronization Protocol for Wireless Sensor Networks

Reliable Time Synchronization Protocol for Wireless Sensor Networks Reliable Time Synchronization Protocol for Wireless Sensor Networks Soyoung Hwang and Yunju Baek Department of Computer Science and Engineering Pusan National University, Busan 69-735, South Korea {youngox,yunju}@pnu.edu

More information

On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services

On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services Zhiyong Liu, CATR Prof. Zhili Sun, UniS Dr. Dan He, UniS Denian Shi, CATR Agenda Introduction Background Problem Statement

More information